{"id":"https://openalex.org/W4411010462","doi":"https://doi.org/10.1145/3714393.3726520","title":"To the Best of Knowledge and Belief: On Eventually Consistent Access Control","display_name":"To the Best of Knowledge and Belief: On Eventually Consistent Access Control","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4411010462","doi":"https://doi.org/10.1145/3714393.3726520"},"language":"en","primary_location":{"id":"doi:10.1145/3714393.3726520","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726520","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726520","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726520","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059485415","display_name":"Florian Jacob","orcid":"https://orcid.org/0000-0002-5739-8852"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Florian Jacob","raw_affiliation_strings":["Karlsruhe Institute of Technology, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085339318","display_name":"Hannes Hartenstein","orcid":"https://orcid.org/0000-0003-3441-3180"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hannes Hartenstein","raw_affiliation_strings":["Karlsruhe Institute of Technology, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059485415"],"corresponding_institution_ids":["https://openalex.org/I102335020"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36117324,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"107","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13471","display_name":"Cognitive Functions and Memory","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6227349638938904},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5190618634223938},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4592684507369995},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4163636863231659},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29024654626846313},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24412554502487183}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6227349638938904},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5190618634223938},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4592684507369995},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4163636863231659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29024654626846313},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24412554502487183}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3714393.3726520","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726520","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726520","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3714393.3726520","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726520","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726520","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411010462.pdf","grobid_xml":"https://content.openalex.org/works/W4411010462.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W2020992910","https://openalex.org/W2036910349","https://openalex.org/W2085407655","https://openalex.org/W2125743465","https://openalex.org/W2125930899","https://openalex.org/W2209943643","https://openalex.org/W2341655714","https://openalex.org/W2979846168","https://openalex.org/W3028769118","https://openalex.org/W3080272816","https://openalex.org/W3104510503","https://openalex.org/W4206337986","https://openalex.org/W4293232534","https://openalex.org/W4389072342","https://openalex.org/W4392635903","https://openalex.org/W4394865968","https://openalex.org/W4402369907","https://openalex.org/W4404987479"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"We":[0],"are":[1,33],"used":[2],"to":[3,27,49,66,116],"the":[4,95,111,151,166],"conventional":[5],"model":[6,65,132],"in":[7,70,105,120,135],"which":[8,47],"access":[9,126],"control":[10],"is":[11,94,156,171],"provided":[12],"by":[13,19],"a":[14,20,29,36,145,160,172],"trusted":[15],"central":[16,30],"entity":[17],"or":[18],"set":[21],"of":[22,41,85,92,110,138,153,168],"distributed":[23],"entities":[24],"that":[25],"coordinate":[26],"mimic":[28],"entity.Authorization":[31],"decisions":[32,88],"based":[34,54],"on":[35,55],"single,":[37],"append-only":[38],"total":[39,161],"ordering":[40,147,162],"all":[42],"actions,":[43],"including":[44],"policy":[45,90],"updates,":[46],"leads":[48],"strong":[50],"consistency":[51],"guarantees.Recent":[52],"systems":[53,78],"conflict-free":[56],"replicated":[57],"data":[58],"types":[59],"(CRDTs)":[60],"break":[61],"with":[62,82,140],"this":[63],"conceptual":[64,114],"gain":[67],"fundamental":[68],"advantages":[69],"latency,":[71],"availability,":[72],"resilience,":[73],"and":[74,89,128,159],"Byzantine":[75],"fault":[76],"tolerance.These":[77],"replace":[79],"up-front":[80],"coordination":[81],"subsequent":[83],"reconciliation":[84],"decentralized":[86],"authorization":[87],"updates.One":[91],"these":[93],"Matrix":[96],"group":[97],"communication":[98],"system,":[99],"whose":[100],"massive":[101],"public":[102],"sector":[103],"deployments":[104],"Europe":[106],"necessitate":[107],"timely":[108],"characterization":[109],"underlying":[112],"alternative":[113],"model.Similarly":[115],"eventually":[117],"consistent":[118,125],"replication":[119],"CRDTs,":[121],"we":[122],"define":[123],"'eventually":[124],"control'":[127],"present":[129],"its":[130],"consequences.Our":[131],"postulates":[133],"thinking":[134],"two":[136],"orderings":[137],"actions":[139],"different":[141],"consequences":[142],"for":[143,148,163],"authorization:":[144],"partial":[146],"storage,":[149],"where":[150,165],"past":[152,167],"an":[154,169],"action":[155,170],"final":[157],"knowledge,":[158],"execution,":[164],"mutable":[173],"belief.":[174]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
